As far as your computer is concerned, it's a fully trusted peripheral. So it sneaks right past detection systems to log keystrokes and other data.